咨询与建议

限定检索结果

文献类型

  • 30,340 篇 会议
  • 4,661 篇 期刊文献
  • 238 册 图书

馆藏范围

  • 35,239 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,864 篇 工学
    • 15,817 篇 计算机科学与技术...
    • 13,232 篇 软件工程
    • 5,858 篇 信息与通信工程
    • 3,549 篇 控制科学与工程
    • 2,704 篇 电子科学与技术(可...
    • 2,667 篇 电气工程
    • 2,335 篇 生物工程
    • 1,895 篇 生物医学工程(可授...
    • 1,540 篇 光学工程
    • 1,370 篇 机械工程
    • 1,241 篇 动力工程及工程热...
    • 1,220 篇 仪器科学与技术
    • 1,026 篇 化学工程与技术
    • 878 篇 安全科学与工程
    • 743 篇 交通运输工程
  • 11,210 篇 理学
    • 6,077 篇 数学
    • 3,067 篇 物理学
    • 2,565 篇 生物学
    • 2,029 篇 统计学(可授理学、...
    • 1,316 篇 系统科学
    • 1,103 篇 化学
  • 5,688 篇 管理学
    • 3,347 篇 管理科学与工程(可...
    • 2,635 篇 图书情报与档案管...
    • 1,815 篇 工商管理
  • 1,635 篇 医学
    • 1,382 篇 临床医学
    • 1,290 篇 基础医学(可授医学...
    • 835 篇 药学(可授医学、理...
    • 711 篇 公共卫生与预防医...
  • 1,058 篇 法学
    • 853 篇 社会学
  • 639 篇 经济学
    • 639 篇 应用经济学
  • 483 篇 农学
  • 446 篇 教育学
  • 179 篇 文学
  • 76 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,120 篇 accuracy
  • 856 篇 feature extracti...
  • 847 篇 computational mo...
  • 758 篇 deep learning
  • 683 篇 training
  • 681 篇 computer science
  • 540 篇 real-time system...
  • 540 篇 machine learning
  • 522 篇 support vector m...
  • 444 篇 predictive model...
  • 412 篇 internet of thin...
  • 364 篇 convolutional ne...
  • 355 篇 data models
  • 354 篇 computer archite...
  • 335 篇 reliability
  • 314 篇 optimization
  • 289 篇 data mining
  • 274 篇 routing
  • 256 篇 wireless sensor ...
  • 246 篇 visualization

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 75 篇 tno technical sc...
  • 66 篇 università di ca...
  • 66 篇 université de st...
  • 65 篇 dept. of informa...
  • 61 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 50 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 47 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 79 篇 coleiro a.
  • 78 篇 gozzini s.r.
  • 70 篇 huang f.
  • 70 篇 dallier r.
  • 61 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 30,114 篇 英文
  • 4,729 篇 其他
  • 298 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Engineering Program and Dept. of Computer Science"
35239 条 记 录,以下是471-480 订阅
Beyond the Blink: IoT's Next-Gen Drowsiness Detection System for Drivers  3
Beyond the Blink: IoT's Next-Gen Drowsiness Detection System...
收藏 引用
3rd IEEE International Conference on Industrial Electronics: Developments and Applications, ICIDeA 2025
作者: Routray, Sidheswar Patel, Nachiket Patel, Dhruv Srivastava, Jyoti Dash, Rudra Narayan Pandit Deendayal Energy University Dept. of Computer Science & Engg. Gandhinagar India Indrashil University Dept. of Computer Science & Engg. Mehsana India Ganpat University Dept. of Computer Engineering Mehsana India School of Electrical Engineering KIIT University Bhubaneswar India
Drowsiness during driving includes high risks for the driver, the co-passengers, and the other people on the road. Advance Driver Assistance Systems (ADAS) have been proposed to reduce these risks. This work introduce... 详细信息
来源: 评论
Identification of Affective States from Malayalam Audios Based on Valence Arousal Prediction
Identification of Affective States from Malayalam Audios Bas...
收藏 引用
2024 International Conference on Brain computer Interface and Healthcare Technologies, iCon-BCIHT 2024
作者: George, Talit Sara George, Jini Pournami, P.N. National Institute of Technology Dept. of Computer Science and Engg. Calicut India Providence College of Engineering Dept. of Computer Science and Engg. Chengannur India
Affective state plays a key role in emotion recognition, influencing various applications from mental health evaluation to human-machine interaction. These states can be described using two primary aspects: valence, w... 详细信息
来源: 评论
HGP-NLP at BioLaySumm: Leveraging LoRA for Lay Summarization of Biomedical Research Articles using Seq2Seq Transformers  23
HGP-NLP at BioLaySumm: Leveraging LoRA for Lay Summarization...
收藏 引用
23rd Meeting of the ACL Special Interest Group on Biomedical Natural Language Processing, BioNLP 2024
作者: Malik, Hemang Pradeep, Gaurav Seth, Pratinav Manipal Institute of Technology Manipal Academy of Higher Education Manipal India Dept. of Data Science & Computer Applications India Dept. of Computer Science & Engineering India
Lay summarization aims to generate summaries of technical articles for non-experts, enabling easy comprehension for a general audience. The technical language used in research often hinders effective communication of ... 详细信息
来源: 评论
Online Transit Entanglement Routing in Quantum Networks: Architecture Design and Optimization
Online Transit Entanglement Routing in Quantum Networks: Arc...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Ho, Wan-Ting Fang, Shing-Yan Hsieh, Wei-Chia Cheni, Li-Feng Kuo, Jian-Jhih Tsai, Ming-Jer National Tsing Hua University Dept. of Computer Science Hsinchu Taiwan National Chung Cheng University Dept. of Computer Science and Information Engineering Chiayi Taiwan
Quantum networks (QNs) gradually gain significant attention due to their higher security compared with classical networks. Conventional approaches in QN routing often aggregate multiple requests into a batch before de... 详细信息
来源: 评论
Performance Analysis of Load Balancing Mechanism in Cloud Computing  1
Performance Analysis of Load Balancing Mechanism in Cloud Co...
收藏 引用
1st IEEE International Conference on Applied Intelligence and Sustainable Computing, ICAISC 2023
作者: Halappa, Annaiah Rajesh, A. Government Engineering College Dept. of Computer Science & Engineering Hassan India Jain Technological University Dept. of Computer Science & Engineering Bengaluru India
The advancement of Information Technology has made cloud computing technology an innovative model for offering its consumers services on a rental basis at any time or location. Numerous firms converted to cloud techno... 详细信息
来源: 评论
A systematic review of decentralized finance protocols
收藏 引用
International Journal of Intelligent Networks 2023年 第1期4卷 171-181页
作者: Shah, Kaushal Lathiya, Dhruvil Lukhi, Naimish Parmar, Keyur Sanghvi, Harshal Dept. of Computer Science and Engineering Pandit Deendayal Energy University Gujarat Gandhinagar382007 India Dept. of Computer Science and Engineering Sardar Vallabhbhai National Institute of Technology Gujarat Surat395007 India Dept. of CEECS Florida Atlantic University Boca Raton United States
Decentralized finance (DeFi) has revolutionized the financial industry in recent years. Industries such as banking, insurance, and investment are experiencing a significant shift due to the growth of DeFi. The decentr... 详细信息
来源: 评论
Non-Invasive Oral Cancer Detection Using Hyperspectral Imaging and Advanced Spectral Unmixing Models
Non-Invasive Oral Cancer Detection Using Hyperspectral Imagi...
收藏 引用
2024 IEEE International Conference on Intelligent Computing and Emerging Communication Technologies, ICEC 2024
作者: Ayyapa, Valluri Kothamasu, Kesava Sriram Killaru, Priyusha Muddana, Saadhivik Aala, Suresh Gutha, Vamsi Kumar, Mukkara Prasana Chinnadurai, Sunil SRM University Dept.of Electronics and Communication Engineering AP India SRM University Dept. of Computer Science and Engineering AP India SRM University Dept. of Computer Science AP India
Oral cancer is a significant global health concern, often leading to high mortality rates due to late-stage diagnosis and the lack of effective early detection methods. Despite advances in medical science, the absence... 详细信息
来源: 评论
Cardiovascular Disease Prediction Utilizing Machine Learning and Feature Selection with Clonal Selection Algorithm  5
Cardiovascular Disease Prediction Utilizing Machine Learning...
收藏 引用
5th International Conference on Sustainable Technologies for Industry 5.0, STI 2023
作者: Rahman, Wahidur Aneek, Riasaad Haque Moinuddin, Md. Sakib, Md. Shadman Iqbal, Md. Sadiq Rahman, Mohammad Motiur Uttara University Dept. of Computer Science and Engineering Uttara Dhaka Bangladesh Z.H. Sikder University of Science and Technology Dept. of Computer Science and Engineering Bhedarganj Shariatpur Bangladesh University of Information Technology and Sciences Dept. of Computer Science and Engineering Dhaka Bangladesh Bangladesh University Dept. of Computer Science and Engineering Adabor Bangladesh Mawlana Bhashani Science and Technology University Dept. of Computer Science and Engineering Tangail Bangladesh
A substantial and rising number of patients suffer from cardiovascular diseases, including heart attacks, heart failure, and other related illnesses. This case surge places increasing pressure on healthcare profession... 详细信息
来源: 评论
Acoustic data acquisition and integration for semantic organization of sentimental data and analysis in a PWSN
收藏 引用
Multimedia Tools and Applications 2024年 1-23页
作者: Das, Sushovan Mondal, Uttam Kr. Dept. of CSE College of Engineering and Mgmt WB Kolaghat721171 India Dept. of Computer Science Vidyasagar University WB Midnapur721102 India
In an acoustic pervasive wireless sensor network (PWSN), the BASE station plays a vital role in gathering and integrating acoustic sensor data from various nodes, including end and router devices tracking time-driven ... 详细信息
来源: 评论
Advancing Phishing Detection with Random Forest: A Machine Learning Approach for Enhanced Cybersecurity  3
Advancing Phishing Detection with Random Forest: A Machine L...
收藏 引用
3rd International Conference on Intelligent Systems, Advanced Computing, and Communication, ISACC 2025
作者: Chandra, Sucheta Das, Priyanka Mandal, Ankita Chakroborty, Sriparno Chowdhury, Ishika Ghosh, Kathamrita University of Engineering & Management Institute of Engineering & Management Dept. of Computer Application and Science Kolkata India
Phishing attacks remain a critical threat to cybersecurity, leveraging deception to steal sensitive information from individuals and organizations. Traditional detection methods often fail to keep up with evolving phi... 详细信息
来源: 评论